hieuha / WIFI-ShieldLinks
Protect your privacy and security online
☆10Updated 8 years ago
Alternatives and similar repositories for WIFI-Shield
Users that are interested in WIFI-Shield are comparing it to the libraries listed below
Sorting:
- A minimalistic packer designed to pack executables. Useful to compress executables or hide malware from early detection☆9Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- ☆24Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆89Updated 7 years ago
- Malware Control Monitor☆87Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Updated 8 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- F.Security Framwork☆19Updated 8 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆64Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago